Passwords

Are Cyber Thieves And Snoopers Turning Your Smart Home Against You?

Peter Turner | Posted 14.07.2017 | UK Tech
Peter Turner

As our homes become jam-packed with smarter devices in the years to come, they may help to makes our lives easier. At the same time, if they are not secured, they also can make the lives of cyber criminals easier by giving access to our whole network and all the devices on it. To be truly safe in our smart homes then we need to start applying the same security principles we already do with our mobile phones and computers.

Risk Assessments: The Surprising Connection Between Pregnancy And IT Security

Nicola Donnelly | Posted 12.06.2017 | UK Parents
Nicola Donnelly

At the same time as you are giving a long and wide-ranging do and don't list, you are tired, possibly nauseous, and being told to relax. Relax. While Googling your shopping list for safety. Nil by mouth suddenly looks like a good option - especially with the regular lectures about maintaining a healthy weight.

Using Our Bodies As ID: Should We Be Worried?

David Emm | Posted 02.06.2017 | UK Tech
David Emm

Biometric markers are ideal for use as identifiers because they are unique and unchanging over time. But that also makes them very vulnerable. If these identifiers are compromised, the potential consequences for victims in terms of loss of privacy and security are severe. If my password is compromised I can change it, but I'm stuck with my fingerprints, eyes and other physical characteristics.

Don't Let Your Smart Home Become A Fool's Paradise

Yossi Atias | Posted 18.04.2017 | UK Tech
Yossi Atias

As a security expert, what freaks me out most about this creepy turn of events is that we appear to be sleepwalking into a culture of surveillance, without exercising our right to personal choice about the level of privacy we want in our lives.

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

Definitive Proof That Using Emojis As Mac Passwords Can End Very Badly

The Huffington Post UK | Thomas Tamblyn | Posted 17.12.2015 | UK Tech

So we'd like to take a moment and thank Artiom Dashisnky. In trying to explore the extreme fringe of personal security he has categorically given us o...

The Biggest Data Breaches of 2015

David Emm | Posted 14.12.2016 | UK Tech
David Emm

This year has seen a steady stream of security breaches, so much so that the news announcements almost seem routine. It's hardly surprising though, as our personal information is such a valuable commodity - not just for companies, but unfortunately for cybercriminals too.

Back to the Books: From the Classroom to the Connected Device

David Emm | Posted 27.10.2016 | UK Tech
David Emm

So with the new school year in full swing, here are my top tips on how to make sure your children stay safe online - no matter how many gadgets they have.

Serena Williams Has Some Incredible Advice On Picking Your Passwords

The Huffington Post UK | Thomas Tamblyn | Posted 31.10.2015 | UK Tech

Not content with being an international tennis star, guest editor of Wired and all-round incredible person, Serena Williams also has some amazing advi...

Top Tips for Protecting Yourself Online

Nicholas Shaw | Posted 21.09.2016 | UK Tech
Nicholas Shaw

High profile hacks such as that of online dating website, Ashley Madison, and last year's attack on Sony have helped bring hacking scandals to the forefront of the news agenda, what these high profile, large scale business hacks fail to bring to light is the smaller scale cyber-attacks targeting consumers, like you and I daily, and the impact these can have on our lives.

Top Five Ways to Increase Your Cybersecurity

Roger Keenan | Posted 01.09.2016 | UK Tech
Roger Keenan

It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.

Transparency and Trust: What's Happening With Our Data?

David Emm | Posted 27.08.2016 | UK Tech
David Emm

Worryingly, many people use the same password and personal details across multiple online accounts, so if their details have been compromised by one attack they could find other online accounts suffer too.

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 18.06.2016 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

Why Our Ears Could Become The Perfect Phone Password

The Huffington Post UK | Nitya Rajan | Posted 15.06.2015 | UK Tech

The shape of your ears could soon be the key to unlocking your phone, if Amazon has anything to do with the future of personalised mobile security. ...

You Could Soon Log Into Your Bank Using Just Emojis

The Huffington Post UK | Nitya Rajan | Posted 15.06.2015 | UK Tech

The humble emoji could soon replace numerical passwords and make for safer online banking practices, according to British software company Intelligent...

Logging Into Your Email Using Just Your Brainwaves Is Now Possible, Apparently

The Huffington Post UK | Nitya Rajan | Posted 03.06.2015 | UK Tech

Passwords have become a common cause of woe in our hyper connected world of multiple accounts and devices, partly because of our inability to remember...

A Security Researcher Just Published 10 Million Passwords

The Huffington Post UK | Michael Rundle | Posted 10.02.2015 | UK Tech

A security consultant has published an unencrypted list of 10 million passwords and usernames - alongside a lengthy explanation about why he should no...

Five Password Tips for Better Small Business Security

Mike Foreman | Posted 07.04.2015 | UK Tech
Mike Foreman

Ever since the commercialization of the World Wide Web in the late '90s, passwords have been a front-line security method for doing business online. Yet, despite huge advances in technology, password practices for the majority of people have not evolved that much.

The Worst Password List Is Here

The Huffington Post UK | Thomas Tamblyn | Posted 21.01.2015 | UK Tech

How secure is your password? The likelihood is that at the very least, it could probably do with a few symbols. At the very worst, you could find your...

The US Public Will Tell You Their Internet Passwords If You Just Ask Them

The Huffington Post UK | Ryan Barrell | Posted 16.09.2015 | UK Tech

Fans of Jimmy Kimmel will know he often takes pleasure in embarrassing other people. In his latest skit, the veteran comedian took to the streets u...

Power of a Password

David Emm | Posted 18.02.2015 | UK Tech
David Emm

As a parting thought, check also to see if the web site provider offers a two-step verification method to protect your account details (e.g. requiring an additional one-time passcode, send via SMS to your mobile phone, in order to modify your account settings). This will further secure your account.

Staying Safe on Cyber Monday

David Emm | Posted 28.01.2015 | UK Tech
David Emm

Cyber Monday, which this year falls on 1 December, is one of the busiest online shopping days of the year - for consumers and fraudsters alike. With more and more of us living connected lives, less people are shopping on the high street.

Hotel Horrors: The Not-So-Comfortable Aspect of Your Trip

David Emm | Posted 24.01.2015 | UK Tech
David Emm

For many of us, the hotel is equally as enjoyable as the holiday itself. These days, some rooms even coming equipped with technology such as free WiFi-connected tablet devices, to make us feel at home. But what you might not know is that what you do on this device might stay there for all to see.

Why Is Data Security So Often Overlooked?

Roger Keenan | Posted 29.11.2014 | UK Tech
Roger Keenan

Technology is everywhere. It forms the basis of our daily lives, from communicating with loved ones to documenting your work in the office. Many businesses that were once stalwarts of the British high street have closed down, simply trading online instead and this shows the power of technology in the modern world.

Is It Just Us, Or Are Apple's Password Requirements Getting Ridiculous?

The Huffington Post UK | Posted 18.06.2014 | UK Comedy

Is it just us, or is it all a bit too much now? (Created by Amanda Wilkie and David Beresford) SEE ALSO: Page 47 Of Apple's Latest Terms & Condi...